Sciweavers

7941 search results - page 192 / 1589
» Network Analysis of Repositories
Sort
View
CORR
2010
Springer
129views Education» more  CORR 2010»
15 years 4 months ago
Understanding periodicity and regularity of nodal encounters in mobile networks: A spectral analysis
Abstract--Study on human mobility is gaining increasing attention from the research community with its multiple applications to use in mobile networks, particularly for the purpose...
Sungwook Moon, Ahmed Helmy
PERCOM
2010
ACM
15 years 2 months ago
Security analysis of reliable transport layer protocols for wireless sensor networks
End-to-end reliability of communications is an important requirement in many applications of wireless sensor networks. For this reason, a number of reliable transport protocols sp...
Levente Buttyán, L. Csik
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
15 years 2 months ago
Using Strategy Objectives for Network Security Analysis
The anticipation game framework is an extension of attack graphs based on game theory. It is used to anticipate and analyze intruder and administrator concurrent interactions with ...
Elie Bursztein, John C. Mitchell
FGCN
2008
IEEE
132views Communications» more  FGCN 2008»
15 years 11 months ago
Deriving Safety Properties for Home Network System Based on Goal-Oriented Hazard Analysis Model
The home network system (HNS, for short) is comprised of networked home appliances, which achieves various value-added services for home users. Assuring safety of the HNS and the ...
Ben Yan, Masahide Nakamura, Ken-ichi Matsumoto
ICICS
2005
Springer
15 years 10 months ago
Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG)
Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a f...
Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili...